Developer Tools

Hash Generator

Compute SHA-256, SHA-384, SHA-512, SHA-1, or MD5 hash of any text. Browser-only, your data stays private.

Input

Hashes

Hash like a pro

We use the Web Crypto API for SHA family hashes (SubtleCrypto.digest), and a small JavaScript implementation for MD5 (which the browser doesn't expose for security reasons). All computation happens locally — your input never leaves your machine.

Frequently Asked Questions

What is a hash?
A hash is a fixed-length fingerprint of any input. The same input always produces the same hash; even a 1-character change produces a completely different output. Used for integrity checking, password storage (with salt + slow KDF), digital signatures, and deduplication.
Which hash should I use?
For new code, use SHA-256 (or SHA-512 if you want larger output). MD5 and SHA-1 are broken cryptographically — they produce collisions, so don't use them for security-sensitive purposes. They're still fine for non-security checksums (e.g. file deduplication).
Is this safe for sensitive data?
Yes — we use the browser's SubtleCrypto API. Nothing is sent to a server. Open dev tools and inspect: zero network requests when you generate a hash.
Can hashes be reversed?
No, not directly. Hashing is a one-way function. However, attackers can pre-compute hashes of common inputs (rainbow tables) — that's why password hashing requires a unique salt + slow KDF (bcrypt, scrypt, argon2), not just SHA-256.
Why do MD5 and SHA-1 still exist?
They're embedded in many older systems and protocols (Git uses SHA-1, BitTorrent uses SHA-1, many file checksums are MD5). They remain useful for non-cryptographic integrity checks where collision attacks aren't a threat.

Related Calculators